
Chapter 6. Device Management
83
3. Fill in the fields according to the information provided in the table, below:
Field
Information
Basic Information
Name:
Provide a name to identify the device. The default is
the name given to the device under its independent
configuration. If you change the name here, the change
only takes place in the CC2000 database. The name on the
original configuration remains the same.
Model:
The CC2000 recognizes the device model and fills
in this field automatically. It cannot be edited. If the device
is a Cat5e KVM switch, the KVM Adapter Cable model
displays here.
MAC Address:
The CC2000 fills in this field automatically.
It cannot be edited.
Department:
For organizational purposes you can
establish department categories (R&D, for example), and
assign devices to them. If you wish to assign this device to
a department, drop down the list of departments (you have
previously created – see
, page 127), and click on the one you want the device
to belong to.
Location:
For organizational purposes you can establish
location categories (West Coast, for example), and assign
devices to them. If you wish to assign this device to a
location, drop down the list of locations (you have
previously created – see
, page 127), and click on the one you want the device
to belong to.
Type:
For organizational purposes you can specify the type
of device that this is. If you wish to do so, drop down the list
of types (you have previously created – see
, page 127), and click on the one you
want.
Description:
If you wish to provide extra information to
describe the device, enter it here. This field is optional.
Contact Information
The name and telephone number of the device
administrator. These fields are optional.
Trap Destination
The email address of the person you want to receive trap
notifications. This field is optional.
Restrictions
Hide IP Address:
As an added security measure, if this
feature is enabled, it keeps the device’s IP address from
appearing in the Port Access
Status and Operation
List
when users log in via their browser.
Hide MAC Address:
As an added security measure, if this
feature is enabled, it keeps the device’s MAC address from
appearing in the Port Access
Status and Operation
List
when users log in via their browser.
cc2k.book Page 83 Tuesday, December 21, 2010 4:00 PM